
v
4.5 Local Installation ......................................................................................................156
4.5.1 Local Installation System Requirements ......................................................157
4.5.2 Installation Instructions.................................................................................157
4.6 Installing on an Infected Host...................................................................................158
4.7 How to Check That the Management Connections Work ........................................159
Chapter 5 Configuring Virus and Spyware Protection 160
5.1 Overview: What can Virus and Spyware Protection be Used for?...........................161
5.2 Configuring Automatic Updates ...............................................................................162
5.2.1 How do Automatic Updates Work?...............................................................163
5.2.2 Automatic Updates Configuration Settings...................................................163
5.2.3 Configuring Automatic Updates from Policy Manager Server ......................164
5.2.4 Configuring Policy Manager Proxy...............................................................165
5.3 Configuring Real-Time Scanning .............................................................................166
5.3.1 Real-Time Scanning Configuration Settings.................................................166
5.3.2 Enabling Real-Time Scanning for the Whole Domain..................................169
5.3.3 Forcing all Hosts to Use Real-Time Scanning..............................................169
5.3.4 Excluding Microsoft Outlooks's .pst File from Real-Time Scanning .............170
5.4 Configuring System Control .....................................................................................171
5.4.1 System Control Configuration Settings.........................................................171
5.5 Configuring Rootkit Scanning...................................................................................172
5.5.1 Rootkit Scanning Configuration Settings......................................................172
5.5.2 Launching a Rootkit Scan for the Whole Domain.........................................172
5.6 Configuring E-mail Scanning....................................................................................173
5.6.1 E-mail Scanning Configuration Settings.......................................................173
5.6.2 Enabling E-mail Scanning for Incoming and Outgoing E-mails....................176
5.7 Configuring Web Traffic (HTTP) Scanning...............................................................178
5.7.1 HTTP Scanning Configuration Settings........................................................178
5.7.2 Enabling Web Traffic Scanning for the Whole Domain ................................179
5.7.3 Excluding a Web Site from HTTP Scanning.................................................179
5.8 Configuring Spyware Scanning................................................................................181
5.8.1 Spyware Control Settings.............................................................................181
5.8.2 Setting up Spyware Control for the Whole Domain......................................185
5.8.3 Launching Spyware Scanning in the Whole Domain....................................187
5.8.4 Allowing the Use of a Spyware or Riskware Component.............................188